General

  • Target

    RustDedicated.exe

  • Size

    1.2MB

  • Sample

    250102-xds8wstrfk

  • MD5

    80802d3e9eb3978b02891a1846900e64

  • SHA1

    c44fe9d1f8c5f6deabfdcfc1ab9e9d4cff4e5cd8

  • SHA256

    1aed0b69955713ca30ddcbd0b36ea83aebc10494fc6eafd64175c1a43d1c64c6

  • SHA512

    0fabd76a7f746dde9a9326e1a486a7b6f61f542f0f88a20c0092cc6d8385d6f4e768db2ba78317340c70094a5a6c8b319958b5f08efec91c2d258d23bd1026a2

  • SSDEEP

    12288:sJ+ii04vDu/1Hp8CoFxH1sB5jVC6+0AsMLkL57dROq3r3hAj7haqgQY+9LGtYSQe:jin0ulOCoFkA6+0vpwAQhBwYSBYFBav

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1321941323787534336/9QZ7ndEN5UASj0mWrWCAOScXmVSBbRHDBhUMzvq-egRazh0wo4nXipep05-RC_cgd1Lb

Targets

    • Target

      RustDedicated.exe

    • Size

      1.2MB

    • MD5

      80802d3e9eb3978b02891a1846900e64

    • SHA1

      c44fe9d1f8c5f6deabfdcfc1ab9e9d4cff4e5cd8

    • SHA256

      1aed0b69955713ca30ddcbd0b36ea83aebc10494fc6eafd64175c1a43d1c64c6

    • SHA512

      0fabd76a7f746dde9a9326e1a486a7b6f61f542f0f88a20c0092cc6d8385d6f4e768db2ba78317340c70094a5a6c8b319958b5f08efec91c2d258d23bd1026a2

    • SSDEEP

      12288:sJ+ii04vDu/1Hp8CoFxH1sB5jVC6+0AsMLkL57dROq3r3hAj7haqgQY+9LGtYSQe:jin0ulOCoFkA6+0vpwAQhBwYSBYFBav

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Detect Umbral payload

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks